Lucene search

K
ibmIBM1FDBEC12027C052441E05FC3350A429DBB3A5C9A3D9891A4F100ED317B0CEB5A
HistoryFeb 19, 2019 - 8:20 p.m.

Security Bulletin: IBM Security Guardium is aware of a GnuTLS vulnerability

2019-02-1920:20:01
www.ibm.com
8

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

Summary

IBM Security Guardium is aware of the following vulnerabilities

Vulnerability Details

CVE-2018-10846, CVE-2018-10845, CVE-2018-10844

Affected Products and Versions

Affected IBM Security Guardium

|

Affected Versions

—|—
IBM Security Guardium | 9 - 9.5
IBM Security Guardium | 10 - 10.5

Remediation/Fixes

Product

|

VRMF

|

Remediation / First Fix

—|—|—
IBM Security Guardium | 9-9.5 | N/A
IBM Security Guardium | 10-10.5 | N/A

Workarounds and Mitigations

IBM Security Guardium is aware of these GnuTLS vulnerabilities. These vulnerabilities exist in a 3rd party component which IBM Security Guardium consumes. The 3rd party vendor has indicated that they will not be fixing the versions of the component that IBM consumes in IBM Security Guardium versions.

IBM suggests that customers using the Remote Syslog feature of the IBM Security Guardium appliance ensure that their Remote Syslog servers are at the latest kernel patch levels to mitigate any possible risk from these vulnerabilities.

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

4.3 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N